AWS CloudFormation infrastructure as code for stack management. Use when writing templates, deploying stacks, managing drift, troubleshooting deployments, or organizing infrastructure with nested stacks.
92
89%
Does it follow best practices?
Impact
97%
1.16xAverage score across 3 eval scenarios
Advisory
Suggest reviewing before use
Multi-environment template design
Environment Parameter
100%
100%
Parameter constraints
100%
100%
Mappings section used
0%
100%
Conditions section used
100%
100%
Conditional resource property
100%
100%
StackName-scoped naming
0%
100%
Outputs with Export
100%
100%
Output descriptions
100%
100%
IAM role for Lambda
100%
100%
Lambda runtime python3.12
100%
100%
No hardcoded secrets
100%
100%
AWSTemplateFormatVersion
100%
100%
YAML format
100%
100%
DynamoDB and RDS data layer protection
DynamoDB PAY_PER_REQUEST
100%
100%
DynamoDB PITR enabled
100%
100%
RDS DeletionPolicy Snapshot
0%
100%
RDS UpdateReplacePolicy Snapshot
0%
100%
Password NoEcho
100%
100%
Password MinLength
100%
100%
StackName-scoped resource names
100%
100%
DynamoDB GSI defined
100%
100%
No hardcoded password
100%
100%
Parameter Description
100%
100%
AWSTemplateFormatVersion
100%
100%
YAML format
100%
100%
Safe production deployment workflow
Change set creation
100%
100%
Change set described
100%
100%
Change set executed
100%
100%
Wait command used
50%
100%
Rollback trigger configured
100%
100%
ASG CreationPolicy added
100%
100%
ASG UpdatePolicy rolling
100%
100%
UpdatePolicy MaxBatchSize
100%
100%
WaitOnResourceSignals
100%
100%
Termination protection
0%
0%
CAPABILITY_IAM flag
100%
100%
DependsOn LaunchTemplate
50%
100%
5df6da7
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.